Note-6

Note-6 - CSE 494/598 Forensic Computing: Computer and...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CSE 494/598 Forensic Computing: Computer and Network Forensics Prof. Gail-Joon Ahn Cyber Gazette ! Acquiring Hard Drives on the Spot ! A new system allows investigators to boot, run, and install investigative tools to examine computers used in the commission of crimes or terrorism, without altering the contents or compromising the chain of evidence . The VOOM Shadow 2 is a hardware device designed to provide "read write access from the host computer's perspective." It also includes a built-in hardware write blocker to maintain the original hard drive unchanged. ! Vanguard Security Conference Scholarship ! IBM Mainframe Security Training, May 31- June 4, 2009 at the Hyatt Regency Jacksonville, in Jacksonville, FL. ! Visit www.go2vanguard.com for scholarship application and requirement IMPORTANT DATES ! Exam #1: Feb 19, 2009 ! Assignment #1: Mar 3, 2009 ! Spring Break: Mar 10 & 12, 2009 ! Exam #2: Mar 31, 2009 ! Class Project Due: Apr 23, 2009 ! Paper Report Due: Apr 28, 2009 ! Class Presentation: Apr 28 & 30, 2009 May 5, 2009 ! Exam #3 (Final): May 7, 2009 (12:10PM – 2:00PM) 3 4 Outline ! Data/Evidence Acquisition ! Formats ! Tools ! Other issues ! File Forensics ! Layers of analysis ! Data Organization ! How to manage ! How to store 5 Data/Evidence Acquisition: Formats ! Formats for Digital Evidence ! Raw format ! Proprietary formats ! Advanced Forensics Format (AFF) 6 Data/Evidence Acquisition: Types and Methods ! Types of acquisitions ! Static (or Dead) acquisitions and live acquisitions ! Four methods ! Bit-stream disk-to-image file ! Bit-stream disk-to-disk ! Logical disk-to-disk ! Sparse data copy of a file or folder File Forensics: Layers of analysis Storage Media Analysis Network Analysis...
View Full Document

This note was uploaded on 08/30/2009 for the course CSE 494 taught by Professor Rao during the Spring '08 term at ASU.

Page1 / 13

Note-6 - CSE 494/598 Forensic Computing: Computer and...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online